Behavioral task
behavioral1
Sample
2736-294-0x0000000000400000-0x000000000042E000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2736-294-0x0000000000400000-0x000000000042E000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
2736-294-0x0000000000400000-0x000000000042E000-memory.dmp
-
Size
184KB
-
MD5
939ebdfd1d0270f6d13d05156ecdd099
-
SHA1
c2b7bc81a7f968871b27866fe6e886adfa1a86cc
-
SHA256
ba771a449a9e22d928c9fade5b29a38283592d6089e14445f10431f232d1c728
-
SHA512
bd74e0078c865231052054b7e0aaab72a996a60de2a7475915d49ec2d3bce2c9a7079a2eb5417bef32fb333314bac366fb9ec8edc604d24295ebfd272de3faf3
-
SSDEEP
1536:n3lnO6qlVZRGWv5PrxBwG3o4iT2WyYwlTGqVYbucWKozHh/9/dL83wYkG8e8hI:3lO/BL44aGYwcqVIPTQHh/9/Vk8e8hI
Malware Config
Extracted
redline
build02
198.244.205.7:27400
-
auth_value
07a1c40c9f9b135aa1fa5395547c344e
Signatures
-
RedLine payload 1 IoCs
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2736-294-0x0000000000400000-0x000000000042E000-memory.dmp
Files
-
2736-294-0x0000000000400000-0x000000000042E000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ